Docstoc

Engineering Programer Employee Evaluation Form

Document Sample
Engineering Programer Employee Evaluation Form Powered By Docstoc
					 SUBMITTED IN PARTITAL FULFILLMENT OF
  MASTER OF COMPUTER APPLICATIONS
MAHARSHI DAYANAND UNIVERSITY, ROHTAK



                BY
         SANGEETA SHARMA
         M.C.A VI SEMESTER
      ENROLLMENT NO. 510101486
           ROLLNO. 322014
      STUDY CENTRE CODE: 1025
            SANGEETA SHARMA
              ROLL NO 322014

    Submitted in partial fulfillment of the
              Requirement of




                     TO


MAHARSHI DAYANAND UNIVERSITY, ROHTAK
        PROJECT CARRIED AT



  NATIONAL INFORMATICS CENTRE
    CGO COMPLEX, LODHI ROAD
        NEW DELHI-110003



               BY
        SANGEETA SHARMA
     ENROLLMENT NO.510101486
         ROLL NO. 322014



    UNDER THE SUPERVISION OF




           Mr. Mohd. Ashfaq
Technical Director & Chief Security Officer
       National Informatics Centre
       CGO Complex, Lodhi Road
           New Delhi-110003
                                           Resume
Sangeeta Sharma
C-85/16, GaliNo.8 Mohanpuri
Maujpur, Delhi-110053
Contact No: 011-22917778, 9818352540
Email: Sangeeta_init@rediffmail.com

OBJECTIVES

Seeking a position that utilizes the strength of my knowledge and experience in
computer field.

PROFESSIONAL QUALIFICATION:
   P.G.D.C.A from C.C.S. University, Merrut with First Division.
   M.Sc (C.S) from Maharshi Dayanand University, Rohtak with First Division.
   Pursuing M.C.A. (6th) Semester from Maharshi Dayanand University, Rohtak.

ACADEMICS QUALIFICATION:
   Passed B.A from C.C.S. University, Merrut in 2002

PROJECTS EXPERIENCE:
     Six months training at National Informatics Center, C.G.O Complex Lodhi Road,
     New Delhi-110003.

PROJECTS UNDERTAKEN DURING TRAINING AT NIC AS PART OF M.C.A:

Automation of Security Related package consists of nic telephone directory, laptop in/out
monitoring, issue of car sticker & identity card issue. The Visual Basic 6.0 has been used
as front end security developed Ms-Access was used as back end or server, which will
be replaced by MS SQL on a server system once every application is in listed on client
system under Ms-Access & any possible error is removed and made appraisal after
removal of any possible error.

1. N.I.C TELEPHONE DIRECTORY:
       Description:-
       This application is developed to assist reception staff of National Informatics
       Center. Telephone directory system in NIC exists on intranet service, which
       especially meant for NIC employees only. The directory contains information up
       to certain level of officers and does not serve the purpose of reception. Security
       needs at reception a telephone directory that contains information about all NIC
       employees irrespective of their designation i.e. from Director General to a peon
       at lowest level. This application will not only serve as telephone directory but also
       provides address and place of posting as well.

2. LAPTOP IN/OUT MONITORING:
     Description:-
     This appliction is developed to monitor movement of laptops from NIC HQ. This
     application software provides a report to monitor the NIC laptops and gives
        information about a particular laptop whether the officer has brought back the
        same or not. Laptop information system also provides easy verification of any
        personal laptop being taken out on the basis of entry records.

3. ISSUE OF CARD STICKERS:
        Description:-
        This project keeps details of issue personal vehicle sticker’s details and
        government vehicle sticker details. The vehicle stickers are issue by CISF
        on the recommended office of CSO, NIC. They vehicle include car
        personal & govt, motor cycle, scooters etc.

4. IDENTITY CARD ISSUE AND MONITORING:
        Description:-
        In this project developed the different package:-
           MHA Identity Card
           Issue of identity card from NIC HQ for NIC employees.
           Issue of Temporary Pass for Externals
           Issue of MES Temporary Photo Pass

PROJECT DURING M.Sc.(C.S.)Final Year:
     PROJECT NAME: VIDEO LIBRARY MANAGEMAENT SYSTEM
       Description:-
     This is a project about Video Library Management System of big or small cds
     library. In this project I am trying to organize whole work through the
     computerized system rather than manual performance.

COMPUTER SKILLS:
  Programming Languages: -          C#, C, C++, Java
  Web Server Application: -         V.B.Net, ASP.Net
  GUI: -                            V.B. 6.0
  RDBMS: -                          MS-Access, SQL 7.0,2000, ORACLE 8i,9i
  Networking: -                     LAN, WAN & MAN
  Scripting Language: -             Java Script
  Markup Language: -                HTML, DHTML, XML
  Methodologies: -                  SAD, S.E., OOAD, SQA, C.G.
  Application Package: -            MS-Office
  OPERATING SYSTEM: -               MS-Dos, Windows (95, 98, 2000, ME, XP), UNIX,
                                    Linux
PERSONAL DETAILS:-
  Date of Birth                     February 8th, 1981
  Martial Status                    Single
  Languages                         English & Hindi

DATE:
                                                                (Sangeeta Sharma)
PLACE:
                              CERTIFICATE



This is certified that the dissertation entitled “AUTOMATION OF
SECURITY RELATED ACTIVITIES” developed and submitted by
“SANGEETA SHARMA” in partial fulfillment of the requirement of
“MASTER OF COMPUTER APPLICATIONS” has been examined and
for to be working satisfactorily.


I wish her a best and bright future.




Date:                                  (Mohd. Ashfaq)
                                       Project Guide
                                       Technical Director
                                       National Informatics Centre
                                       CGO, Complex, Lodhi Road
                                        New Delhi-110003.
                            CERTIFICATE


It is to certify that the project work entitled “AUTOMATION OF
SECURITY RELATED ACTIVITIES”, which is being submitted by
me in partial fulfillment of the requirement for award of the degree of
“MASTER OF COMPUTER APPLICATIONS (MCA) Sixth Semester
or Diploma Name in the Directorate of Distance Education is an
authentic work carried out by me at…………………………
Under the supervision and guidance of ………………….

The matter imbedded in this project work has not been submitted
earlier for the award of any other degree or diploma.




(Signature and Name of Supervisor)               (Signature of Student)

                                                 Name: Sangeeta Sharma

                                                 Enroll. No: 510101486

                                                 Center Code: 1025

DATE: -

PLACE: -


                  (Signature & Name of Study Centre Head)
                        ACKNOWLEDGEMENT

The completion of the project entitled, “Automation of Security Related
Activities” gives me an opportunity to convey my gratitude to all those who
have helped me to complete this project successfully within time.


  I am much obliged to National Informatics Centre, New Delhi for giving
me an opportunity and the congenial atmosphere to learn while working
without bounds. I would like to express my gratitude to Mr. Mohd. Ashfaq,
Technical Director, who provided me the facility for making this project. I
gracefully acknowledge that in spite of his hectic schedule, devoted a lot a
time with me. His kind cooperation and advised help me to concentrate on
the project and to present it in this form.
    I would like to thank my internal guide Mr. Rajoo, Faculty in D.A.V.IT
Centre, Tilak Nagar.

    Last but not the least; I am also thankful to my parents for their wishes
and encouragement that lead me successfully through this project.




  Dated:                                      (Sangeeta Sharma)
                        SYNOPSIS
Project Title             Automation of Security Related Activities
Developer’s Name          Sangeeta Sharma
Roll No.                  322014
College Address           D.A.V. IT Centre, Tilak Nagar
Training Organization     National Informatics Centre
                           A-Block, CGO Complex
                           New Delhi-110003
Synopsis Abstracts         The project entitled “Automation of Security
                           Related Activities” shares all the information
                           about the drive in terms of    properties and
                           methods and also allows user to perform all
                           operation on them. Security automation is as
                           per the needs of the organization and in
                           accordance with the current trends of the
                           market.
Duration                   M.C.A. 6th Semester
Position                   Project trainee. System analysts and
                           developed for the portion of package
                           assign to me.
Project Guide              Mr. Rajoo Vasta
(Internal)
Project Guide              Mr.Mohd Ashfaq (Tech. Dir.)
(External)
Development Platform       Visual basic 6.0 (Front end),
                           MS-Access (Back End) & Crystal
                           Report
           ABOUT NATIONAL INFORMATICS CENTRE

1.1 Introduction

     National Informatics Center (NIC) is a premier Information
    Technology organization in India committed to providing state-of-
    the-art solutions for the IT needs of the Government of India at
    all levels. NIC carries the distinction of being the largest IT
    Organization in the Country and has set up a satellite based
    nationwide computer communication network called NICNET
    having over 1400 nodes connecting the National Capital, the
    State Capitals and the District Headquarters to one another. The
    IT services of NIC range from Consultancy, Software Design &
    Development, Office Automation and Networking Services to
    Training, Video Conferencing, CAD, EDI, Multimedia and Internet
    Services including Web Site Development and Hosting. NIC has
    a nationwide presence with its offices spread all across the
    Country, from Leh to Andaman & Nicobar Islands.

    NIC Headquarters is based in New Delhi. At NIC Headquarters, a
    large number of Application Divisions exist which provide total
    Informatics Support to the Ministries and Departments of the
    Central Government. NIC computer cells are located in almost all
    the Ministry Bhawans of the Central Government and Apex
    Offices including the Prime Minister’s Office, the Rashtrapati
    Bhawan and the Parliament House. Apart from this, NIC has
    various Resource Divisions at the Headquarters, which
    specialize into different areas of IT and facilitate the Application
    Divisions as well as other NIC Centers in providing state-of-the-
    art services to the Govt.

1.2 National Informatics Centre(History)

  The organizational set up of NIC encompasses its Headquarters at
  New Delhi, State Units in all the 28 State capitals and 7 Union
                Territory Headquarters and District centers in almost
                all the Districts of India. The Organization employs a
                large pool of efficient technical manpower. At the
                NIC Headquarters, a large number of Application
                Divisions exist which provide total Informatics
Support to the Ministries and Departments of the Central
Government. NIC computer cells are located in almost all the
Ministry Bhawans of the Central Government and Apex Offices
including the Prime Minister’s Office, the Rashtrapati Bhawan and
the Parliament House. Apart from this, NIC has various Resource
Divisions at the Headquarters, which specialize into different areas
of IT and facilitate the Application Divisions as well as other NIC
Centers in providing state-of-the-art services to the Govt. At the
State level, NIC State Centers provide informatics support to their
respective State Government and at the District level lay the NIC
District Informatics Offices which strive hard to provide effective
informatics support to the Development, Revenue and Judiciary
administration of the District. In order to promote Information
Technology in the country, focusing on INTERNET Technology
based Value-added Services in the area of Industry, Business and
Commerce, NIC has also established 17 National Information
Technology Promotional Units (NITPUs) at major industrial/
Commercial cities viz.- Ahmedabad, Bangalore, Bhopal,
Bhuwaneswar, Chandigarh, Chennai, Hyderabad, Jaipur, Kanpur,
Kochi, Kolkata, Lucknow, Mumbai, Nagpur, Patna, Pune and
Vishakapatnam. These centres provide Video-conferencing
facilities, EDI services and other INTERNET Technology based
Services over NICNET.

Ever since its inception in 1977, NIC has been taking firm steps
while moving towards its aim of being the pinnacle of IT in India.
And the biggest leap in this direction was taken in 1988, when
NIC’s satellite based computer communication network NICNET
went into operation.1NICNET is one of the largest VSAT based
networks of its kind in the Country. NICNET has over 1400 VSATs
installed currently and is poised to grow to several thousands of
VSATs in the next couple of years. There is no single VSAT that
can meet the requirements of all sections of Users. Hence,
NICNET has been upgraded to support a variety of VSATs namely
CDMA, TDMA, FTDMA, SCPC, DAMA and Receive only VSATs.
The network uses state-of-the-art technology in C-Band as well as
KU_Band ranges.
1.3 Services

  The spectrum of services provided by NIC encompasses various
  dimensions of the Information Technology Arena and can be
  broadly listed as under:

          Consultancy
          Software Design & Development
          Networking
          Internet Services
          WWW Services
          Video Conferencing
          Computer Aided Design (CAD)
          Multimedia
          Geographical Information System (GIS)
          Electronic Commerce
          Office Automation
          Training
          Rural Informatics
          Bibliographic Informatics
          Computer Telephony Interface (CTI)
          Computer Aided Paperless Examination Systems
           (CAPES)
          Mathematical Modeling and Simulation

National Information Technology Promotion Units (NITPUS)

NIC has set-up NITPUs to provide Internet and other value-added
services to the exporters with a view of promoting the export sector in
the country. The NITPUs are located at 11 major export cities of the
country connected through NICNET.

The range of service provided by these units includes:

          Internet Connectivity
          E-mail
          Web Authoring and Hosting
          Video Conferencing
1.4 Facilities

    NICNET facilitate the following requirements of NIC in serving
    various government departments and associated organizations
    throughout the country.
          Monitoring of vital socio-economic projects.
          Online retrieval from database and updating.
          Optimum utilization of expensive computer resources.
          Emergency communication systems.
          Sharing latest software tools.
          Dissemination of information.
          Electronic mail facility.
          International remote access.
          Electronic Data Interchange (EDI).
          Internet access.

1.5 Principal Objectives of NIC
          Development of computerized information systems in
           various sectors of the economy are planning, project
           monitoring and decision support.
          Development of modeling, forecasting and simulation
           technique’s that is required for planning and decision
           support.
          Improvement of the analytical capability and presentation
           of information utilization are central, state and district level
           planning.
          Promotion of information culture at districts, state and
           national level.
          Establishment of a computer communication network are
           ensuring ready access of information across the nation
           and enabling optimal use of resources.
          Evolving standards all data collections, compilation and
           dissemination with the cooperation’s of related agencies
           at districts, state and central levels.
          Provide gateways for accessing international databases
           for those working districts, states and centrals level.
     The advent of Information Technology as a highly
      leveraged enabling tool for delivery of services in the
      public and the private sector has by now been universally
      recognized. This has redefined the fundamentals and has
      the potential to change the institutions as well as the
      mechanisms of delivery of services forever. It is in this
      context that the issued of Smart Governance- Electronic
      Governance needs to be analyzed.

Quite obviously, therefore, the objective of achieving Electronic
Governance EG) goes far beyond mere computerization of
stand alone back office operations. It means to fundamentally
change as to how the Government operates and this implies a
new set of responsibilities for the executive, legislature and
citizenry. The effort should aim to bring about a social catharsis,
which needs to be orchestrated in a comprehensive, concerted
and planned fashion.

NIC is the organization directly responsible for implementation
E-Governance in various sectors. It is also educating people on
E-Governance and helps to achieve it. NIC is also publishing
Monthly Informatics magazine, which is an E-Governance
product bulletin.
This gives information about E-Governance product and
services in addition to achievement, products services from
NIC.
                    ABOUT PROJECT


 2.1 Introduction

    WHAT is Automation of Security Related Activities?

    Chief Security officer heads the security division. The
    applications have been developed as per his requirement. The
    Automation of Security Related Activities have been developed
    using Visual Basic 6.0 and Ms Access. Visual Basic 6.0 used as
    front end and Ms Access as back end. This system controlled the
    data entry regarding the transactions like entry of employee’s
    records, search, delete and modify on existing records, queries
    on these records, entry on laptop movement i.e. IN/OUT from
    NIC Externals and Internals Persons, NIC telephone directory,
    MHA Identity Card, Issued of Card Sticker for Government
    Vehicle and Personal Vehicle.
    Automation of Security Related Activities contains different
    modules:-
          Identity Card Issue and Monitoring
             1. MHA identity card
             2. Issued of identity card from NIC HQ for NIC
                employees
             3. Issue of Temporary Photo Pass for Externals
             4. Issue of MES Temporary Photo Pass
          Laptop IN/OUT Monitoring
          Issue of Card Stickers
          Telephone Directory of NIC employees


More automation like computer equipments, Non-technical goods
being taken IN/OUT from building, key (room key and locks)
management and special permissions to people visiting NIC on
holidays and nights ate to be taken up in future. Once the complete
Automation of Security Related Activities package is ready, the
database will be taken up to a server. Temporary identity cards are
issued to the employees from other organizations, workers from
contractors by NIC or C.P.W.D. for various services in NIC. The
temporary card issued can have maximum validation period of six
month. Non-photo passes will have validity one month. Ministry of
home affairs identity cards are issued to NIC employees and MHA
assist security Department to alert NIC employee in advance for
renewal of their identity cards and avoid paid of penalty amount.
This project is developed according to the above passage. This
project will develop the computerized temporary pass for the trainee
and other persons who come in NIC for the few months. And this
project also maintains the database for the employees who want to
MHA cards. This project also sends an automatically E-Mail to the
employees whose cards are going to expire.

   Laptop information system helps security staff to have a check
    on movements of laptops, which are theft prone.

   Telephone directory system in NIC is available on intranet
    services, which especially meant for NIC employee’s only. The
    directory contains information up to certain level of officer and
    does not serve the purpose of the reception. Reception staff
    wanted a telephone directory, which contains information about
    all NIC employees irrespective of their designation i.e. from D.G
    u to lowest level i.e. messenger and safai-wala. This directory
    not only serves as telephone directory also provides address
    and place of posting as well.



2.2 Name of the Project



    AUTOMATION OF SECURITY RELATED ACTIVITIES
2.3 Project Leader

    The project is being analyzed and overviewed by a highly
    qualified, efficient project leader. He is working in NIC since
    December 1978 and has been involved in development of
    various applications software. He is responsible for the
    maintenance of CAD/CAM software from 1984 to 1996. He was
    also looking the operational maintenance activity of host
    computer, the cyber 730 and cyber 830. Currently he is working
    as technical director. He is first technical person who is working
    as CSO. That is why computerization of security division is taken
    up which was not done so far in organization like NIC.

    Name:               Mr. MOHD. ASHFAQ
    Designation:        TECHNICAL DIRECTOR, NIC




2.4 IDENTIFICATION AND PROBLEM DEFINITION

    To remove the problems in manually handling data, reports, this
    system is to be implemented regarding the trends in
    computerized facilities. This computerized system can overcome
    the different problems, which are faced in manual transaction.
    This development is based in GUI and hence user friendly, which
    allow even a person having little knowledge about computers to
    operate the package with ecase controlling execution through
    menus.

    Automation of Security Related Activities

    In the solution of problems with existing system is developed by
    using Visual Basic as front-end, Ms-Access as back-end and in
    the Windows XP on a PIV system.
2.5 MODULES OF PROJECT

       Starting Module
       Login Module
       Telephone Directory of NIC Employees
       Laptop IN/OUT Monitoring
       Issue of Card Stickers
       Identity card issue and Monitoring
           1. MHA identity card
           2. Issue of identity card from NIC HQ for NIC employees
           3. Issue of Temporary Photo Pass for External and
              Personals
           4. Issue of MES Temporary Photo Pass


2.6 OVERVIEW OF MODULE

         Laptop Information System

   Now a day Laptops have become an essential part of employee’s
   life working in various sectors. It is being carried by employees to
   provide held as an assistant. NIC being a technical organization
   that too in computer field and visited by many visitors’ with
   laptops everyday. Laptops are small and theft prone. Therefore,
   monitoring of Laptop’s IN/OUT is essential. The Laptop are also
   being taken OUT or brought IN by NIC employees. This laptop
   may be the property of NIC. This application software provides a
   report to monitor the NIC laptops and give information about a
   particular laptop whether the same has been brought back by the
   officer. This information system also provide easy verification of
   any personal laptop being taken out on the basis of record
   already in the system, through it s.no, make, model. This
   verification normally takes too much time in manual system
   especially where laptop’s exact date of bringing-in is not known
   or there is too much difference between IN/OUT dates. This
   process takes seconds in verifications just by entering s.no.
   being IN/OUT. NIC laptops may not be taken our without proper
gate-pass. The same is true for personal laptops if not taken out
on the same day.


   NIC Telephone Directory

This directory has been developed to assist reception staff. This
directory not only provides telephone number of any employee in
NIC but also their address and place of posting. In case any
visitor approaches reception and wishes to visit any employees
of NIC, reception staff can find out the address, telephone
number, place of posting etc. in seconds. In case the employees
doesn’t sit in A-Block, CGO Complex, New Delhi-110003, the
reception staff will guide the visitor on the basis of employees
place of posting which may be any ministry/department outside
CGO Complex.

   Issue of Car Stickers

This application keeps details of issue personal vehicle and
government vehicle sticker detail. The vehicle stickers are issue
by CISF on the recommended officer of CSO & NIC. They
vehicle include car personal and government, motor cycle,
scooters etc. The application is maintain records of all issued
vehicle sticker to NIC, with date of issue for easy tracking.


      MHA Identity Form

MHA identity cards which are issued from Ministry of Home
Affairs through NIC employees are covered under MHA identity
cards. These cards are issued to government employees on the
basis of government recommendation by authorized signature. In
NIC responsibility the recommendation of with Mohd. Ashfaq,
Technical Director for who is a head security division. These
applications along with list of MHA for preparation of identity
card. MHA is forward recognized application and raise objection
if any and return backs such application.
MHA identity cards are prepared for all other applicant where no
objections are found. On receipt of application with objection
necessary action taken by security section NIC to remove the
objection and forward again to MHA for preparation of the identity
card. All receipt of identity card individual is informed to collect
the some from security section. In this passes record is
maintained, which gives information on the forwarding of
application and receipt of identity card.

This application with little legal modification in documentation it is
following the above process the automated process will allow
security section to timely to inmate for collection of cards, expire
of the cards in their position, any other query the basis of
employees, date of issue, date of expire etc. Often employees
who forget the renew card in time to penalizes. The advance
animation on the basis of the information generated by this
application will avoid penalties for late renewal.


The applicant form is used to maintain the database of the
applicant who comes for issuing the MHA I-Card. Ministry of
home affairs identity cards are issued to NIC employees and
MHA assist security department to alert NIC employees in
advance for renewal of their identity cards and avoid cards and
avoid paid of penalty amount. In this form we have also used
crystal report to print reports.

    Temporary Pass for External

Temporary Pass form is used to maintain the database of the
persons who comes in NIC for some period of month. This form
is also used to generate the temporary pass to the person.
Temporary identity cards are issued to the employees from other
organizations, workers from contractors by NIC for various
services in NIC. We have used crystal report which is used to
print the temporary pass and reports.
    Issue of MES Temporary Photo Pass

MES temporary pass is nothing but a temporary pass
valid for MES also. The MES temporary pass and
temporary pass already discussed are produced by the
same application. The procedure is same for both. In
case of MES temporary photo pass, MES is clearly
mentioned in bold letters to indicate that it’s valid for
MES. MES passes are also valid for other NIC premises.

   Issue of identity card from NIC HQ for NIC employees


All eligible employees of NIC posted in Delhi are issued identity
card by MHA. NIC employees posted in states get their identity
card issued by state governments. At some places NIC state unit
is issuing identity card for employees posted in distt and tahsil.

Any NIC employees not having identity card issued by local
authorities applies for identity card at NIC HQ, where the identity
card is issued by chief security officer of NIC. This
application/software also allows security section NIC to print
identity cards in addition to other entry and monitoring functions
like in MHA identity card application.



  Splash Form

This form is the staring form of the Project and contains

information about the "Automation of Security Related Activities”.

   Login Form

This function identifies a user through password and allows
access of the computer facilities. Further, the user can only
   execute command depending upon the privileges defined in the
   system.

       Master Detail Form

   Master details form is used to maintain the database of the
   employees that is further used in Applicant and record forms to
   match or pick the data.

2.7 BENEFIT OF AUTOMATION OF SECURITY RELATED
    ACTIVITIES


   The Automation of Security Related Activities is user friendly and
   reliable. It provides GUI to the user that in turn provides simplicity
   to the user. This system overcomes the entire problems that are
   raised in manual transaction.



2.8 NEED FOR THE SYSTEM DEVELOPMENT
   WHY     WE     NEED     THIS     AUTOMATION         OF    SECURITY

   REALATED ACTIVITIES:-


  Due to various problems in existing manual system as explained
  below: -

   Inability of modification of data: The managing of huge data
    effectively and efficiently for efficient results, storing the details
    of the equipment etc. in such a way that the database can be
    modified as not possible in the manual system. Avoid
    redundancy and maintain consistency.
   Not user friendly: Any manual system normally is not user
    friendly because the retrieval and storing of data is slow and
    data is not maintained efficiently.
   Difficulty in reports generation: Either no report is generated
    in a manual system or they are generated with great difficulty.
    Reports take time to generate in the manual system. At times
    reports became useless by the time they are produced and the
    decision if any had already been taken on the assumption.
   Manual operator control: Manual intervention is there and
    leads to a lot of chaos and errors.
   Lot of paper work: Existing system requires lot of paper work
    and even a small transaction require many papers fill. Moreover
    any unnatural cause (such as fire in the organization) can
    destroy all data of the organization. Some times few pages may
    led to difficult situation.
   No support in strategic competitive advantage: Manual
    systems, as already discuss earlier takes two much time. The
    accuracy may be doubtful. The company which takes policy
    decision on assumption which is a common practice in the
    absence of computerized system or more likely to fail and loose
    against competitor in 21st century


2.9 CHARACTERISTICS OF THE PROPOSED SYSTEM
   Easiness in modification of data: The proposed system
    provides managing of huge data effectively and efficiently for
  efficient results, storing the details of the equipment, causes
  etc. in such a way that the database can be modified.
 Reports are easily generated: Reports can be easily
  generated in a proposed system. So any type of reports can be
  generated in a proposed system which helps the managers in a
  decision-making activity.
 No or very few paper work: The proposed system either does
  not require paper work or very few paper works is required. All
  the data is fed into the computer immediately and various
  reports can be generated through computers.
 Support strategic competitive advantage: Existing system
  support strategic competitive advantages. Since the proposed
  systems provide easiness in reports generating it will provide
  strategic advantages among competitors.
                        DECLARATION



I hereby declare that this “Automation of Security Related

Activities” has been genuinely furnished by me.


This is a maiden concept on whish no one has worked previously.




Signature:
                     OBJECTIVES

    A software Package is collection of different programs
     that are used to achieve a predefined goal or objectives.
     In most cases a manual system that is use has to be
     automated on the same lines so as to provide a more
     efficient outcome.
    There are various benefits of using an automated
     computerized system as compared to a manual system. It
     is efficient, accurate and less time consuming. Timely
     availability of analytical reports for decision-making and
     helps in better planning. Same report may be generated
     again and again and it will have no difference.
    To develop a software system it is very essential to
     completely understand the working and all the
     different aspects of the opportunity present for the new
     system and various directives
     for the system. We need a through understanding of the
     existing system.
     For an efficient development of the system we need to
      follow a life cycle known as system development life
      cycle. The life cycle steps are: -
           1. Need for system development
           2. Analysis
           3. Design
           4. Code
           5. Acceptance
           6. Maintenance.
These steps provide a great help for the developer life cycle
can be defined as a process by which system development life
cycle can be defined as a process by which systems analysts;
software engineers and programmers build system. It is a
project management tool, used to plan, execute and control
system development projects.
    To understand the current requirement and the supporting
     applications and data management.
                      ANALYSIS

3.1 OVERVIEW OF ANALYSIS
   Analysis is the heart of the process. It is a key component of the
   first two phase of cycle. In phase one, we focused on the
   problem definition and initial investigation, where analysis helps
   and determining potential solutions. The outcome is system
   specifications that initiate the system design.

      The analysis part has to be done carefully because
   specifications are difficult to maintain or modify. A simple change
   in user requirements necessitates changes in several part of the
   document. During analysis phase of the project and my friend
   and faculty of the PCTI also help me to made project and
   prepared report in accordance, which we termed the life cycle of
   our project.


3.2 THE ANALYSIS HAS THE FOLLOWING ATTRIBUTE:


       It is graphic. The DFD for example presents a picture of
        what is being specified and is conceptually easy to
        understand of the specification.
       It calls for a rigorous study a commitment that is often
        taken lightly approach to the system analysis.
       The process is partitioned so that we have a clear picture
        of the progression from general to specific in system flow.
       It is logical rather than physical in nature. The elements not
        depend on vendor or hardware. This specifies in precise,
        concise and highly readable manner the working of the
        system and how it hangs together.
3.3 FEASIBILTY ANALYSIS

  DURING FEASIBILTY ANALYSIS WE INSPECTED THE

      TECHNICAL FEASIBILTY
      ECONOMICAL FEASIBILTY
      OPERATIONAL FEASIBILTY
  Which we found ok for the development of the software

3.4 DESIGN PHASE

   During design phase we made its data flow diagram of the s/w,
   which will be predicted later.

3.5 S/W DEVELOPMENT PHASE

   During this s/w phase we development our s/w using one of the

   most powerful tool visual basic.


3.6 TESTING PHASE

  During testing phase we prepare the dummy data and found ok
  from us, then this test was follows by live data from the end user.
                       SYSTEM DESIGN

4.1 Design Overview

   Design is the phase where quality is forecasting in software
   development. Design provides with representative of software that
   can be accessed for quality. Design is the only way that we can
   accurately accessed for quality. During design we make decisions
   that will ultimately affect the success of software construction. And
   as important, the ease with which software can be maintained.
   Design is the only way that can accurately translate a customer’s
   requirement into a finished system or product. Software design
   serves as the foundation of all steps of software engineering and
   maintenance that follows. Without design, we risk building an
   unusable system, one that fail when small changes are made or one
   that may be difficult to test. Three characteristics that serve as a
   guide for the evaluation of good design: -
         The design must implement the entire explicit requirement in
          the analysis model and it must accommodate the entire
          implicit requirement desired by the customer.
         The design must be readable and understandable guide for
          those who test code and subsequently maintain the
          software.
         The design should provide a complete picture of the
          software, addressing the data functional and behavioral
          domains from an implement perspective.
4.2 DESIGN PRINCIPLES
   Software design is both a process and a model. The design process
   is set of iterative steps that enable the designer to describe all
   aspects software to be built. Basic design principle includes: -
        The design process should not suffer from tunnel vision.
        The design should not be traceable to the analysis model.
        The design should exhibit uniformity and integration.
        The design should be structured to accommodate change.
        The design should be reviewed to minimize conceptual
    errors.
        The design should be addressed or quality as it being
    created.


4.3 DESIGN CONCEPTS
   Design concepts provide the software designer with a foundation
   from which more sophisticated design can be applied.
   Program Structure or Software architecture. During detailed design
   the data structure and the algorithms used by different modules are
   designed. The outcome of detailed is usually known as the Module
   Specification Document.
4.4 QUALITIES OF GOOD SYSTEM DESIGN:-
        A good design should capture all the functionalities of the
          system correctly.
        It should be easily understandable.
        It should be efficient so that every member of the client side
          as well as the end user should feel comfortable about is\t.
        It should be easily amenable to change, i.e. easily
          maintainable. A good design is also easy to maintain and
          change. Unless a design is easily understandable, it would
          require a tremendous effort to maintain it. In order to
          enhance the understandability of a design, it should have the
          following features.
        Use of consistent and meaningful names for various design
          components.
        Use of a cleanly decomposed set of modules.
        Neat arrangement of modules in a hierarchy i.e. tree-like
          diagram.


4.5 Input Design

   Input design is a part of overall system design, which requires any
   careful attention. Often the collection of input data is most
   expensive part of the system. In term of both the equipment’s used
   and the number of people involved, it is the most contact point for
   the user with the computer system. And it is prone to error. If data
   going into the system is incorrect, then the processing and output
   will magnify these errors. Thus the designer has a number of clear
   objectives in input design.
   Considering the output requirements, to capture the necessary input
   data in most efficient way was designed. The input design has been
   done keeping in view that, the interaction of the user with the
   system is simple yet effective.


   The following points were considered during input design.
         Controlling amount of input
         Avoiding delay
         Avoiding error in data
         Eliminating extra spaces
         Keeping the process simple
         Size, color and arrangement of the forms
   Based on above-mentioned the input forms and screen of were
   designed.


4.6 SCREEN DESIGN (OUTPUT DESIGN)
   All the screens of the Automation of Security Related Activities
   are developed with view to provide the user with easy operation
   in a simple and efficient way with minimum possible keystrokes.
   Instruction and important message re flashed on the screen.
   Almost every screen is provided with option selection facilities.

   Much emphasis is given on speedy processing and speedy
   translation between the screens. Each screen is designed to
   make it as much user friendly as possible. So to say the user can
   operate the system without going through `operating manual `/`
   user operational manual`. The Performa for colleting data has
   been designed by taking in consideration all possible types of
   data needed by the user. All the necessary input forms were
   designed.



4.7 SYSTEM DESIGN FOR AUTOMATION OF SECURITY RELATED
    ACTIVITIES:

   In our project we classified our design in two steps. First we have
   design master forms in every module by which a user can get
   information about the module i.e. what are the task can be
   performed. Next we designed other form that performs the desire
   task depending on the task for it is designed. Another screen that
   we had designed is the Automation of Security Related Activities
   screen. In which end user will fill the appropriate information of the
   employee .Our System design follow the forms laid by the software
   design techniques. Firstly preliminary design had been design then
   detailed design when Automation of Security Related Activities
   screen had been developed. Firstly we are following software
   engineering paradigm. So first of all we have done requirement and
   specification phase and then we have applied designing phase that
   is the one of the most important part of our project.



4.8 SYSTEM SECURITY
   In this we have not emphasized on system security completely as
   we have told to do so. It us a departmental project therefore easy
   access was the main concern and not the too much security.
   Despite this security features are there in the system which can be
   invoked as and when required. Security against unintentional
   deletion has been provided in the system. We have given login id
for admin and for user and their respective password. But in terms
of systems security instruction of project guide had been followed,
which will be upgraded in future development. After porting data on
to Ms SQL after the completion Security package, access
permissions will be decided as supported by MS SQL.
Following points is to follow in terms of System Security: -
      No complex Structure.
      Reliable and Secure Database.
      Restrictions should be less.
      Options regarding system security should be mandatory.
         HARDWARE AND SOFTWARE REQURIMENTS

                        SOFTWARE: -
FRONT END: -   VISUAL BASIC 6.0
               For this Project, we are using Visual Basic as a
               Front-End.

OPERATING SYSTEM USED: -
                            WINDOW XP POFESSIONAL


DATABASES: -   MICROSOFT ACCESS
               For this project, we are using Microsoft Access as

               a Back-End. Here all the data will be saved.


INTERFACE: -   For the connectivity between these two things we
               will be using ODBC.


                        HARDWARE: -

PROCESSOR: -   COMPUTER PENTIUM IV (933 MHZ)

MEMORY: -      128 MB

HARD DISK: -   4 GB

RAM: -         128 MB

MONITOR: -     COLOR
              SCOPE OF THE PROJECT

5.1 Scope of Automation of Security Related Activities:-

    The system could be a completed pool of information could be
    limitless. The following improvements could be made in future
    to the system:

        The system is presently developed for internal use for
         NIC. Future vision is to develop it for additional security
         features.
        The system could be made more interactive on receiving
         the feedback provided by
        The user from time to time.
        More reports can be generated as per need.



5.2 Features of the system:-

    As already mentioned, the system is GUI-based, so it is easy
    for the user to interact with program. The system generates
    various information about coverage of establish and the user
    can make the desired query as and when required. This makes
    system worthwhile.

    The main highlights of the system are:

        System is User Friendly:-

         System provides the user-friendly screens for information
         retrieval.

        System is fully Menu Driven and easy to use:-

         The system is totally menu driven. The user can select
         any of the activity just by a click of a key. The software
         operation is very easy, requiring minimal training in
         computer.
 Easy to Use:-

  The system is very easy to use even a novice person who
  don’t have any knowledge about computer can user it.

 Easy to Maintain: -
  Since the application is loaded only at one machine, the
  newer version can be released easily since only the code
  at the one machine needs to be changed.
               PREPARATION OF TEST DATA

Both types of data, Level Test Data and Artificial Test Data were used
to ensure the correctness of the system.

6.1 Using Live Test Data: -

    The Live Test Data was actually extracted from the organization
    files. After the development of the entire master screen
    programs, the users of the system were asked to key in the set of
    data from their normal activities. This was mainly done with the
    intention of testing the system for finding errors after the partial
    development of the system and also to see how comfortable the
    user was with system.

    It is very difficult to obtain live data in sufficient amounts to
    conduct extensive testing. Although its realistic data the shows
    how the system would perform for the typical processing
    requirements, assuming that the live data entered is in fact
    typical, such data does not test all the combinations or formats
    that enter the system. The bias towards typical values does not
    provide a true system test and in fact ignores all the cases most
    likely to cause system failure. So Artificial Test Data was
    effectively used for test purposes.


6.2 Using Artificial Test Data

    Artificial Test Data was used to test all the combinations of
    formats and values. It was designed keeping in mind the
    intention that it should make possible the testing of all the logic
    and control paths through the program. Also the user of the
    system helped in preparing the artificial test data.
    The Artificial Test Data was prepared based on the following
    Validations: -
    Range Checks: - Data was chosen in such a way that there
    were values within the range and values at the boundaries.
   Field Size Checks: - Data was chosen in such a way that there
   were values exceeding the maximum width of the field.


   Key Fields: - Data was chosen so that the Primary key and
   foreign key constraints would be violated.


   Data Type Checks: - Data was chosen in such a way that it
   would be not match with the data types.


   Rules Checks: - Data types chose in such a way that the system
   specific business rules were satisfied.




6.3 UNIT TESTING

   In the unit testing all the units in the system are in the system are
   independently tested. This is important as the user comes to
   know about each and every single unit of the system completely.
   This testing is done during the programming stage. Each and
   every program in each and every unit is tested thoroughly.
      All the units in the systems like master form, import form,

   identity card detail form, vehicle sticker form; telephone directory

   form, laptop in/out from etc. are test independently. The logical

   errors in the code are also checked. The entire program is then

   complied using raw data.
6.4 SYSTEM TESTING

   In system testing the entire after sales system is again
   thoroughly tested. All the forms are fully tested and checked. It is
   also if the entire system has given the expected result. All the
   code and reports are checked for satisfactory and expected
   results. Thus all these types of the system are done to see
   whether after system is given the desired results.
               REQUIRMENT ANALYSIS

7.1 Overview
    Analysis is the heart of the process. It is a key component of
    the first two phases of cycle. In phase one, we focused on the
    problem definition and initial investigation, where analysis helps
    and determining potential solutions. The outcome is system
    specifications that initiate the system design.
    The analysis part has to be done carefully because
    specifications are difficult to maintain or modify. A simple
    change in user requirements necessitates changes in several
    part of the document.


The Analysis has the following attribute
   It is graphic. The DFD for example presents a picture of what
     is being specified and is conceptually easy to understand of
     the specification.
   The process is partitioned so that we have a clear picture of
     the progression from general to specific in system flow.
   It is logical rather than physical in nature. The elements of a
     system do not depend on vendor or hardware. This specifies
     in precise, concise and highly readable manner the working of
     the system and how it hangs together.
   It calls for a rigorous study a commitment that is often taken
     lightly in approach to the system analysis.
7.2 Software Requirement Analysis:-

    As he project being developed is concerned about the
   “Automation of Security Related Activities”, a dedicated
   effort was made to gather the information required for the
   development of the same.

   Consulted the following departments:-

             1. Security Division of NIC.
             2. Technical Division of NIC.

   Gathered a quite deal of information from the above divisions
   regarding the following procedures:
                 Employee’s I-Cards Details
                 M.H.A. I-Cards Details
                 N.I.C. I-Cards Details
   Consulted colleagues and several websites regarding sample
   projects in order to get the exact requirements for the
   development
                 IMPLEMENTATION

8.1 Implementation

   Implementation is a process that includes all hose activity that to
   convert an existing system (manual or existing) to new system.
   There are three type of implementation. This is the most
   important phase of system Development Life Cycle where the
   actual implementation of designed system occurs. First phase is
   the implementation of a computer system to replace a manual
   system, the problem encountered are converting files, training
   users, creating accurate files and verifying printouts for integrity.
   Second phase is implementation of a new computer system to
   replace an existing system. This is usually a difficult conversion.
   If not properly planned, there can be many problems. Some large
   computer system has as long as a year to convert.
   Third phase is when modified application is developed to replace
   an existing system using the same computer. This type of
   conversions is comparatively easy to handle provided there are
   no major change in the files.
   In case of our system it was implementation of a computer
   system to replace an existing manual system. A through study of
   manual system was conducted for the successful implementation
   of the new system. The difficulties encountered are changing
   files from manual to computer based to store the database and
   ensuring that files created are correct. And verifying the results
   provided by the system to ensure consistent results. Proper
implementation procedures were followed to give a reliable and
more importantly a satisfying system.
Inventory Control System totally related to file system of
computer, since the query demanded by the user is fulfilled using
these files. This project is divided into small modules so that
each query can be satisfied quickly, accurately and so that other
programmer can reuse modules. Modules were then integrating
to from the complete system. Since each module was having
different functions to perform like one module works to find out
detailed information of a particular case, other works to give the
information about, how the user logs into project by giving the
valid user name and password etc. debugging becomes easy.
During the implementation the problem that encountered are
whether to use SQL or MS Access to maintain the database.
Decision was made to use MS Access at client level and Oracle
at server level.
An important factor during implementation is giving to users. This
is lightly necessary to minimize their resistance to change. Since
the system is very user friendly and the users are provided with
different options at every stage, so no need for specific was felt.
8.2 MAINTENANCE

  Maintenance includes the modification of existing applications to
  correct errors and bugs, improve the performance or even adapt to
  a changed environment. The service can be extended to include
  change requests from clients dealing with enhancements and
  refinements.

  As part of the services the responsibility is keeping applications
  reliable and available on a continuous basis. This eases the key
  challenge of running existing applications, providing code
  maintenance and performance management. The maintenance
  model used for this service consists of the following phases and
  activities:
                AUTOMATION OF SECURITY RELATED
                         ACTIVITITES




1.0 MASTER         2.0 FILE                  3.0 OPERATOR   4.0 HELP




1.1 EMPLOYEES      2.1 IMPORT                 3.1 LOGIN      4.1 ABOUT
RECORD                                        FORM

                    2.1.2 EMPLOYEE
                    MASTER

1.2 STATE
RECORDS                                                      4.2
                    2.1.3 TELEPHONE &                        CONTENT
                    ADDRESS


                     2.2 IDENTITY CARDS

1.3
DESIGNATION
                                                             4.3 TITLE
RECORDS             2.2.1 MHA CARDS


                    2.2.2 NIC CARDS



                   2.2.3. TEMPORARY CARDS



                      2.3 VEHICLE STICKERS
 LOGIC DIAGRAM
                            START




                          LOGIN FORM

                                                          CONTENT

                          PASSWORD

                                              HELP        ABOUT

                     WELCOME WINDOW
EXIT
                                                          TITLE



MHA &         LAPTOP              CAR        TELEPHONE
ISSUE       MONITORING         STICKERS      DIRECTORY    TEMPORARY
CARDS                                                        PASS



SAVE
RECORDS     SAVE IN/OUT         SAVE          IMPORT       SAVE
            RECORDS             RECORDS       DATA         RECORDS


DISPLAY
RECORDS     DISPLAY
            RECORDS             DISPLAY                    DISPLAY
                                               SAVE        RECORDS
                                RECORDS
                                               RECORDS

DELETE
RECORDS                         ISSUE                      DELETE
            DELETE              PERSONAL &                 RECORDS
            RECORDS                           REPORTS &
                                GOVERNMEN
                                              VIEW
REPORTS &                       T STICKERS
VIEW
                                                           VIEW &
                                               DELETE      REPORTS
            REPORT
                                REPORTS
CLOSE
                       DATA STRUCTURE

DATA STRUCTURE: - MHA Identity Card


DESCRIPTION: - This data structure will describe all the information
about employee details and card details.

Employee Code+
Employee Name
Designation
State of Posting
Card Serial No.+
Valid up to+
Date Received from mha
Date of issue+
Card Status
Date of Application
Date of Forward
Reason issue

    DATA STRUCTURE: - Issue of identity card from NIC HQ
     for NIC employees


DESCRIPTION: - This data structure will describe all the information
about issue of identity card from nic HQ for nic employees.

Employee Code+
Employee Name
Designation
State of Posting
Card Serial No.+
Valid up to+
Date Received from mha
Date of issue+
Card Status
Date of Application
Reason issue
DATA STRUCTURE: - Temporary Pass

DESCRIPTION: - This data structure will describe all the information
about temporary pass.

Applicant Index+
Name
Date of Birth
Designation
Employee/Institute
Valid up to+
Date of issue+
Card Serial No+
Card Status+
Reason issue
Mes/A Block

DATA STRUCTURE: - Laptop In/Out Monitoring

DESCRIPTION: - This data structure will describe all the information
about brings the Laptop Nic & External person.

Employee Code+
Employee Name
Designation+
State of Posting
Auto Index
Laptop No.+
In-date+
Out-date+
In-time+
Out-time+
Person index+
Name
Organization
Person serial
Gate Pass No.
                     DATA ELEMENT DICTIONARY


      DATA         DESCRIPTION        DATA   WIDTH    KEY     RANGE
   ELEMENT                            TYPE                      OF
      NAME                                                   VALUES
Employee Code      Emp Code           Text   5       Pk     1-999,A-Z
Employee Name      Emp name           Text   25             A-Z
Designation        Designation        Text   25             A-Z
State of Posting   State Posting      Text   25      Pk     1-999,A-Z
Card Serial No     Card_Srno          Text   6              1-999,A-Z
Date of issue      Date Issuing       Date   10             1-9999
Date Application   Date Application   Date   10             1-9999
Date Forward       Date forward       Date   10             1-999
Card Status        Card status        Text   5              1-999,A-Z
Valid Up to        Vaild_up to        Date   10             1-9999
Customer No        Customer no        Text   6       Pk     1-999,A-Z
Laptop No          Laptop No          Text   25             1-999,A-Z
In Date            In Date            Date   10             1-999
Out Date           Out Date           Date   10             1-999
In Time            In Time            Date   10             1-999
Out Time           Out Time           Date   10             1-999
Person Index       Person Index       Text   6       PK     1-999,A-Z
Accessories No     Accessories No     Text   10             1-999,A-Z
Gate pass no       Gate Pass No       Text   10             1-999,A-Z
Vehicle Reg No.    Veh_reg_no         Text   6              1-999,A-Z
Vehicle Type       Veh_type           Text   25             1-999,A-Z
Relation Owner     Rel_with_Owner     Text   10             1-9999, A-Z
Owner              Owner              Text   10             1-999,A-Z
This form has details of the programmer. The form has a load button and
unload button. When we click the load button it shows the login form. When
we click the unload button the project is closed.
This form is a login form. This form has a username and password. This form has a two-
button ok and cancels. When we click on the ok button, it shows the title form. On
clicking the cancel button close the login form, but show the main form.
If the programmer takes a wrong password, the project not activated.
This form is a title form. It has one button. On clicking this button then start the mdi
form.
This form has a system information and warning. System information is very useful for
the programmer. This form has two button ok and system information. When we click the
system information button, it shows the information of the system. On clicking the ok
button to close the form.
                          USER MANUAL

To start the system either click on the shortcut Automation of

Security Related Activities on the desktop or start it from the startup

menu. When the system is started, the logon screen appears and

then enters the following: -

     Username-> security, password-> security

On entering the correct user name and password, the menu can be
seen. The menu has the following components: -
   1. Master Records
   2. Issue Records
   3. Login Form
   4. View & Reports
   5. About

Master Records: -

      Employee Master
      Telephone & Address
      Identity Cards
           MHA Identity Card
           NIC Identity Card
           Temporary Pass
                  Vehicle Stickers
                  Login Form


EXIT: - Allows we to exit the program and takes we to desktop.
REPORT GENERATION

    Not Ready Card
    Ready For Issue
    Issued Card
    Expiring Next Month
    Notice about Expired Card
    Backup File
    External Report
    Not Ready Sticker
    Ready For Issue
    Issued Stickers
         Government Vehicle
         Private Vehicle
         List of Stickers in Backup
         BUTTONS USED IN THE INPUT SCREENS

                   LAPTOP COMMAND BUTTON



 OUT
           This command button is used enter information like s.no,
           designation, laptop no, laptop s.no, date of out, time out
           that goes out from NIC.

 IN        This command button is used to enter IN entry of laptop.


 SAVE      This command button is used to save a particular record.


 PRINT     This command button is used to print the report.


Note: This entire command button has same function in every form.
          TELEPHONE COMMAND BUTTONS


 ADD
            Used to add a new record in the database.


 SEARCH    This command button is used to enter IN entry of
           laptop.

 SAVE       This command button is used to save a particular
            record.

 PRINT      This command button is used to print the report.


 DELETE     Used to delete an existing record in the database.


 CLOSE      Used to close button the program


Note: This entire command button has same function in
every form.
                 MHA COMMAND BUTTONS

  ADD          Used to add a new record in the database.


 SEARCH        This command button is used to enter IN entry of
               laptop.

 SAVE          This command button is used to save a particular
               record.

 PRINT         This command button is used to print the report.

 DELETE        Used to delete an existing record in the database.


 DISPLAY       Used to display record.


 CLOSE         This is used to close the form


Note: This entire command button has same function in every form.
            CARSTICKER COMMAND BUTTONS


  ADD          Used to add a new record in the database.


 SEARCH        This command button is used to enter IN entry of
               laptop.

 SAVE          This command button is used to save a particular
               record.

 PRINT        This command button is used to print the report.


 DELETE        Used to delete an existing record in the database.

 DISPLAY       Used to display record.


 CLOSE         This is used to close the form.


Note: This entire command button has same function in every form.
    USER ACCEPTANCE TEST AND CERTIFICATION


The user acceptance was sought while designing and developing the
system. The user of the system was already consulted from time
during the software development process.

After carefully completing the Analysis Phase of the software
development process, the user acceptance was taken for the design
phase and then table layouts were drawn. The inputs were carefully
with user requirements in mind, the working prototype of the system
was developed and the users feed back were taken view. After
careful completion of each module, module testing was done in
parallel. After successful completion of the testing phase, the user
was again consulted the system was implemented to the complete
satisfaction of the user.
                 MHA IDENTITY CARD


                     EMPLOYEE MASTER
    emp_code       emp_name       designation     state_posting
      E001        Pooja Verma    Tech. Director        Delhi
      E002          Deepak        Programmer        New Delhi
      E003        Deepak Singh     Tech. Asst.      New Delhi




                 CURRENT MHA CARD FILE
emp_code card_srno valid_upto date_rec_mha date_issue card_status
  E001    MHA01 12/31/2005 11/30/2005 12/12/2005         Ready
  E002    MHA02 1/23/2006       1/23/2006   1/23/2006    Ready
  E003    MHA03 1/23/2006       1/23/2006   2/11/2006    Ready




                     HISTORY CARD FILE
emp_code card_srno valid_upto date_issue card_status date_returned
  E001    MHA01 12/31/2005 12/12/2005       Issued     9/12/2005
  E002    MHA02 1/23/2006 1/23/2006         Issued     1/23/2006
  E003    MHA03 1/23/2006 2/11/2006         Issued     2/11/2006




                      APPLICATION FILE
emp_code date_application reason_issue date_forward app_status
  E001       2/9/2006         Lost       2/9/2006   Self Submit
  E002       2/9/2006         Lost       2/9/2006   Self Submit
  E003      2/11/2006       Returned     2/11/2006      Nic
ISSUE OF IDENTITY CARD FROM NIC HQ FOR NIC EMPLOYEES



                               EMPLOYEE MASTER
            emp_code         emp_name        designation       state_posting
         E001               Pooja Verma     Tech. Director Delhi
         E002               Deepak          Programmer New Delhi
         E003               Deepak Singh    Tech. Asst.    New Delhi



                             NIC CARD APPLICATION
                emp_code        date_app    reason_issue       app_status
         E001                   8/31/2005   Lost         Printed
         E002                   8/31/2005   Returned     Printed
         E003                   1/23/2006   Transfer     Printed



                            CURRNET NIC CARD FILE
           emp_code        card_srno valid_upto date_issue   card_status
         E001              C001       3/12/2006   9/2/2005 Returned
         E002              C002       3/12/2006   9/3/2005 Returned




                                HISTORY CARD NIC
         emp_code card_srno valid_upto date_issue card_status date_return
         E001     C001       3/12/2006   9/2/2005 Lost          9/12/2005
         E002     C002       3/12/2006   9/3/2005 Returned      9/12/2005
ISSUE OF TEMPORARY PHOTO PASS FOR EXTERNALS



                        APPLICATION MASTER
     app_index   name         date_birth designation          emp\inst
     20060001 Pooja Verma      1/12/1981 Programmer      Mict
     20060002 Deepak           1/12/1982 Student Trainee IGNOU
     2006003 Jai               2/12/1981 Programmer      MICT



                         CURRENT TEMP PASS
      app_index   card_srno date_issue       valid_upto       mes/a block
      20060001    C001        1/12/2006         12/31/2006   NO
      20060002    C002        1/12/2006          1/12/2006   YES
      20060003    C003        1/13/2006          2/12/2006   NO




                         OLD TEMP PASS FILE
     app_index    card_srno    Date_issue valid_upto   mes\ a block
     20060001     C001           1/12/2005 12/31/2006 NO
     20060002     C002           1/12/2006  1/12/2006 YES
     20060003     C003           1/13/2006  2/12/2006 NO


                       TEMP APPLICATION FILE
         app_index        req_mes/a block reason_issue        print_status
      20060001           NO               Trainee             Printed
      20060002           YES              S/W Supports        Printed
      20060003           NO               S/W Supports        Printed
                   LAPTOP IN/OUT MONITORING


                                      EMPLOYEE MASTER
                 emp_code    emp_name        designation           state_posting
                 E001     Neeraj Sharma    Programmer         Pune
                 E002     Tina Singh       Tech.Director      Delhi
                 E003     Jyoti Sharma     Software Eng.      New Delhi




                                          NIC LAPTOP
                 auto_index   laptop_no in_date     in_time      out_date   out_time
                     1        L001      2/14/2006 6:15:35 AM     2/14/2006 6:15:50 AM
                     2        L002      10/9/2005 10:00:00 AM    10/9/2005 11:30:00 AM
                     3        L003     10/13/2005 10:15:00 AM   10/13/2005 4:30:00 AM


                                     PERSON DETAIL FILE
                  person_index         name         designation         organization
                       1         Neeraj Sharma   Programmer          NIIT
                       2         Tina Singh      Tech.Director       MICT
                       3         Jyoti Sharma    Software Eng.       IGNOU




                                     EXTERNALS FILE
person_index person_sr laptop_no in_date in_time       out_date out_time accessories   gatepass_no
     1       P001      L001      2/14/2006 6:16:20     2/14/2006 6:16:36 Nil           Null
                                                AM                    AM
     2       P002      L002      10/9/2005 10:00:00    10/9/2005 11:30:00 Nil          Nil
                                                AM                    AM
     3       P003      L003     10/28/2005 10:15:00   10/28/2005 4:30:00 Nil           G001
                                                AM                    AM
TELEPHONE DIRECTORY OF NIC EMPLOYEES


                     EMPLOYEE MASTER
   emp_code       emp_name       designation       state_posting
  E001          Deepak         Tech.Director   Delhi
  E002          Rahul          Programmer      Delhi
  E003          Deepak         Tech.Director   Rajastan
  E004          Jai            fhg             gfd




                    EMPLOYEE ADDRESS
  emp_code     office_add           resi_add               city
  E001       C.P             C-12,Y.V               New Delhi
  E002       N.P             B-2\10 Y.V             New Delhi
  E003       G.P             C-89                   Jaipur
  E004       CGFD            DFD                    SFDS




                            emp_phone
   emp_code          Office_phoneno               resi_phone
  E001                  543535353                  24324242
  E002                  522424242                  42423425
  E003                  546767676                  87767676
  E004                  632765675                  43454564
               ISSUE OF CAR STICKERS


                      EMPLOYEE MASTER
  emp_code      emp_name    designation           state_of_posting
    101         Rubina   Trainee                CGO complex,New delhi
     102        kareem      programer           CGO complex,New delhi
     103        Parul       Asst Programer      CGO complex,New delhi
     104        Preeti      programer           CGO complex,New delhi




                 GOVT VEHICLE APPLIACTION
   emp_code       emp_department   veh_regno                    veh_type
     101         Security Dep.   VH01                    Car
     102         Tarining Dep    VH02                    Bike
     103         Security Dep.   VH03                    Bike




                     GOVT VEHICLE ISSUE
  emp_code     Veh_reg_no   veh_type   sticker_no   Valid_upto    Status
         101   VH01         Car        SS01         12/31/2006 Issued
         102   VH02         Bike       SS02         12/31/2006 Issued
         103   VH03         Bike       SS03         12/31/2006 Issued




                 STICKER APPLICATIONF FILE
          veh_reg                             rel_with date_of_
emp_code           veh_type        owner                        status
            _no                                _owner    app
      101 VH01    Car            Rubina       Self     2/7/2006
      102 VH02      Motor/Cycle kareem        Self         2/7/2006
      103 VH03      Motor/Cycle DEEPAK        Brother      2/7/2006
      104 VH04      Motor/Cycle pooja         Sister       2/7/2006
                           STICKER FILE
                           stick                   date
emp_c veh_re veh_ty              rel_with date_rec       valid_
                    owner er_n                     _of_i        status
 ode   g_no    pe                _owner     _cisf         upto
                             o                     ssue
  101 VH01 Car      Rubina SN0 Self       2/7/2006 2/7/2 12/31/ Ready
                           1                        006 2006
  102 VH02 Motor/ karee SN0 Self          2/7/2006 2/7/2 12/31/ Ready
             Cycle m       2                        006 2006




                     VEHICLE STATUS FILE
 emp_code        veh_reg_no       status            validity
          101 VH01              Issued                         12/31/2006
          102 VH02              Issued                         12/31/2006
                      MY ROLE IN PROJECT


As a trainee, I have been assigned the responsibility of
computerization of the part of Automation of Security Related
Activities, which has been discussed in this project report. The
various tasks related to modules completed during the project period
are:

        Forms Design
       Database Design
       Development of modules for data processing
       Testing & Debugging
       Implementation
                       BIBLIOGRAPHY


   Mastering Visual Basic 6.0 by Evangelos Petroutsos.
   Visual Basic Programming Black Book by Steven Holzner.
   Complete reference Visual Basic.
   Visual Basic 6.0 from ground up by Gray Cornell.
   Crystal Report 7.0 the complete reference by Peck, George.

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:283
posted:11/14/2010
language:English
pages:123
Description: Engineering Programer Employee Evaluation Form document sample